How we reverse engineered OSX/Pirrit, got legal threats and survived

How we reverse engineered OSX/Pirrit, got legal threats and survived

What if I told you that you have a piece of software on your machine that runs with root privileges, injects data into your browser without you even knowing, makes itself impossible to remove, and it heavily impacts the performance if your machine? Join me for a session about OSX malware reverse engineering, the legal threats that we got from the malware authors, IDA screenshots and opsec fails.

Amit leads the security research at Cybereason's Boston HQ. He specializes in low-level, vulnerability and kernel research, malware analysis and reverse engineering. Whenever he is not taking apart malware and exploring the dark and undocumented corners of operating systems at the office, you could find him in his lab at home reverse engineering routers and other IoT devices and finding horrible bugs on them.

Prior to joining Cybereason, Amit spent nine years leading security research projects and teams for the Israeli government, specifically in embedded system security.